Which cmdlet should you use for each requirement?
Your company recently deployed Exchange Server 2016.
Users use a variety of mobile devices to access their mailbox, including iPhones and iPads.
You need to configure security for the users who connect to the corporate network by using their mobile device.
The solution must meet the following requirements:
Users must be required to enter a complex password to unlock their device.
Only devices that run iOS 8 or later must be allowed to connect to the Exchange Server organization.
Users who fail to download the security settings defined by the organization must be prevented fromaccessing their mailbox.
Which cmdlet should you use for each requirement? To answer, drag the appropriate cmdlets to the correct
requirements. Each cmdlet may be used once, more than once, or not at all. You may need to drag the split bar
between panes or scroll to view content.
Select and Place:
Which command or commands should you use?
You work as a Network Administrator at ABC.com. The network contains a single Active Directory Domain
Services (AD DS) domain named ABC.com. The network includes servers that run Windows Server 2008 R2
Service Pack 1 (SP1) and Windows Server 2012. All servers in the network have Windows Remote
Management (WinRM) enabled. You use a Windows 7 Enterprise client computer named ABC-Admin1. You
are currently logged in to ABC-Admin1. From your client computer, you want to obtain the IP address of a
Windows Server 2012 member server named ABC-File1.
Which command or commands should you use?
Which TCP port should you recommend?
Your company has an Exchange Server 2016 organization. The organization contains 2,000 mailboxes and five
Mailbox servers, including one server named EX1.
Five hundred users retrieve email from their mailboxes by using an IMAP4 client application from the Internet.
The users also connect to EX1 to send email messages. All of the email messages are secured by using TLS.
An administrator recently replaced the company’s firewall.
Users now report that they fail to send email messages from the IMAP4 client application. You verify that the
users can retrieve email messages form their mailbox successfully.
You need to recommend which TCP port must be allowed so that the users can send email messages from the
IMAP4 application successfully.
Which TCP port should you recommend?
What Windows PowerShell cmdlet should you run?
HOTSPOT
Your network contains an Active Directory domain named contoso.com. The domain contains two DHCP
servers named Server1 and Server2. Both servers have multiple IPv4 scopes.
Server1 and Server2 are used to assign IP addresses for the network IDs of 172.20.0.0/16 and 131.107.0.0/16.
You install the IP Address Management (IPAM) Server feature on a server named IPAM1 and configure IPAM1
to manage Server1 and Server2.
Some users from the 172.20.0.0 network report that they occasionally receive an IP address conflict error
message.You need to identify whether any scopes in the 172.20.0.0 network ID conflict with one another.
What Windows PowerShell cmdlet should you run?
To answer, select the appropriate options in the answer area.
Hot Area:
Which cmdlet should you use?
You have an Exchange Server 2016 organization.
Some users access their mailbox by using an Android or an iOS device.You need to prevent the users from using OWA for Devices to access their mailbox.
Which cmdlet should you use?
Which cmdlet should you run?
Your network contains an Active Directory domain named contoso.com. The domain contains an IP Address
Management (IPAM) server that uses a Windows Internal Database.
You install a Microsoft SQL Server 2012 instance on a new server.
You need to migrate the IPAM database to the SQL Server instance.
Which cmdlet should you run?
What command should you run in Contoso?
HOTSPOT
You have an Active Directory forest named contoso.com that contains an Exchange Server 2016 organization
named Contoso.
Contoso.com has a two-way forest trust with an Active Directory forest named fabrika.com. The fabriakm.com
forest contains an Exchange Server 2016 organization named Fabrikam.
You need to ensure that the users in Contoso can access the free/busy information of all the users in Fabrikam.
An administrator from Fabrikam runs the following command in the organization.
Get-MailboxServer | Add-ADPermission –Accessrights Extendedright –Extendedrights “ms-Exch-EPI-TokenSerialization” –User “CONTOSO\\Exchange Servers”
What command should you run in Contoso? To answer, select the appropriate options in the answer area.
Hot Area:
You need to back up the server to Azure
You have a server named Server1.
A Microsoft Azure Backup of Server1 is created automatically every day.
You rename Server1 to Server2.
You discover that backups are no longer created in Azure.
You need to back up the server to Azure.
What should you do?
What should you identify?
HOTSPOT
A company named Contoso, Ltd. deploys Exchange Server 2016.Contoso plans to establish a hybrid deployment between Exchange Server and a new Microsoft Office 365
tenant.
You need to identify which relative URL paths in the on-premises environment will be accessed by the Office
365 tenant.
What should you identify? To answer, select the appropriate options in the answer area.
Hot Area:
Which cmdlet should you run?
You have a server named Server1 that runs Windows Server 2012 R2.
A Microsoft Azure Backup of Server1 is created automatically every day.
You need to view the items that are included in the backup.
Which cmdlet should you run?